dadevel / mssql-spiderLinks
Automated exploitation of MSSQL servers at scale
☆112Updated this week
Alternatives and similar repositories for mssql-spider
Users that are interested in mssql-spider are comparing it to the libraries listed below
Sorting:
- ☆159Updated last year
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆176Updated 2 years ago
- ☆118Updated 4 months ago
- PowerShell Reverse Shell☆78Updated 2 years ago
- C# implementation of TokenFinder. Steal M365 access tokens from Office Desktop apps☆140Updated last year
- A tool for enumerating potential hosts that are open to GSSAPI abuse within Active Directory networks☆159Updated last year
- Cortex XDR Config Extractor☆132Updated 2 years ago
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.☆82Updated 10 months ago
- ☆73Updated this week
- linikatz is a tool to attack AD on UNIX☆149Updated last year
- ☆89Updated 6 months ago
- Snaffler reimplementation in Python - https://github.com/SnaffCon/Snaffler☆106Updated 3 weeks ago
- ☆70Updated 4 months ago
- Lateral Movement☆124Updated last year
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆123Updated 4 months ago
- Collection of random RedTeam scripts.☆206Updated last year
- Lord Of Active Directory - automatic vulnerable active directory on AWS☆147Updated last year
- ACL abuse swiss-knife☆125Updated 2 years ago
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆130Updated 6 months ago
- A Python POC for CRED1 over SOCKS5☆151Updated 9 months ago
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆94Updated 2 years ago
- PowerShell collector for adding MSSQL attack paths to BloodHound with OpenGraph☆107Updated this week
- Just some random Red Team Scripts that can be useful☆152Updated last year
- ☆163Updated 8 months ago
- Introductory guide on the configuration and subsequent exploitation of Active Directory Certificate Services with Certipy. Based on the w…☆133Updated last year
- Easy red team phishing with Puppeteer☆131Updated 2 years ago
- Deduplicate custom BloudHound queries from different datasets and merge them in one customqueries.json file.☆41Updated last year
- ☆67Updated 6 months ago
- A Python based ingestor for BloodHound☆84Updated 2 years ago
- Bypass AMSI By Dividing files into multiple smaller files☆46Updated 2 years ago